Search results

Jump to navigation Jump to search
  • ==Sources of standards for Information Security== ...[[Information Security Management System]]s" are of particular interest to information security professionals.<br> ...
    2 KB (287 words) - 14:29, 8 March 2007
  • ==Sample Information Systems and Technology Security Policy== ...protection of the confidentiality, integrity, and availability of Company information assets. ...
    4 KB (465 words) - 15:46, 13 January 2014
  • ==Service Desk Management== ...called for in IT Service Management (ITSM) as defined by the [[Information Technology Infrastructure Library]] (ITIL). It is intended to provide a Single Point o ...
    4 KB (552 words) - 16:15, 20 March 2007
  • ...rces under sub-chapter I of chapter 35 of this title, or the disclosure of information to Congress or the Comptroller General of the United States. ...
    851 bytes (128 words) - 21:01, 3 June 2010
  • ==IT Management Booklet== ...risk management processes to ensure effective information technology (IT) management.<br> ...
    5 KB (645 words) - 18:03, 27 April 2007
  • ...rces under sub-chapter I of chapter 35 of this title, or the disclosure of information to the Congress or the Comptroller General of the United States. While this ...
    940 bytes (143 words) - 21:44, 1 June 2010
  • =='''Asset Management'''== ...It is about the management, control and protection of '''all''' aspects of Information / Data in whatever form for example paper records or X-Ray Film and fiche. ...
    5 KB (705 words) - 13:29, 23 May 2007
  • ==IT Risk Management Process== ...essments. Senior management should identify, measure, control, and monitor technology to avoid risks that threaten the safety and soundness of an institution.<br ...
    4 KB (528 words) - 16:58, 28 March 2010
  • '''PO 3.4 Technology Standards'''<br> ...measure compliance with these standards and guidelines. This forum directs technology standards and practices based on their business relevance, risks and compli ...
    2 KB (311 words) - 16:29, 1 May 2006
  • ...nal standard for [[Compliance#ITIL_IT_Infrastructure_Library: | IT Service Management]]. It was developed in 2005, by the BSI Group. It is based on and intended ...ogether, these form a top-down framework to define the features of service management processes that are essential for the delivery of high quality services.<br> ...
    2 KB (298 words) - 14:25, 23 April 2010
  • ==Change Management== ...anges (fixes) - with minimum risk to IT infrastructure. The goal of Change Management is to ensure that standardized methods and procedures are used for efficien ...
    4 KB (588 words) - 16:23, 21 March 2007
  • ....316). Policies provide the necessary authority to establish and implement technology- and solution-specific standards.<br> :1. [[Sample_Information_Security_Program_Charter:|'''Sample HIPAA Information Security Program Charter''']]<br> ...
    5 KB (614 words) - 16:46, 25 July 2006
  • Policies are the broad rules for ensuring the protection of information assets, and for implementing a security strategy or program. Generally brie :[[Sample Information Security Program Charter:|'''Sample Information Security Program Charter''']]<br> ...
    3 KB (404 words) - 14:53, 25 July 2006
  • ...ncorporate the consequences of these trends into the development of the IT technology infrastructure plan.<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (290 words) - 17:49, 25 April 2007
  • ==Configuration Management== ...rocess''' that tracks all of the individual Configuration Items (CI) in an information system which may be as simple as a single server, or as complex as the enti ...
    4 KB (570 words) - 16:12, 23 March 2007
  • ...sually created by an organization's [[Chief Information Officer]] (CIO) or technology manager and should be designed to support the organization's overall [[busi One of the principal purposes of creation of a technology strategy is to create consensus and stakeholder buy-in. There are many met ...
    5 KB (777 words) - 17:59, 16 February 2007
  • [[Organizing Information Security:|'''Organizing Information Security''']]<br> [[Asset Management:|'''Asset Management''']]<br> ...
    3 KB (378 words) - 21:27, 18 January 2015
  • ==Financial Management== ...ery section of the [[ITIL]] best practice framework. The aim of Financial Management for IT Services is to give accurate and cost effective stewardship of IT as ...
    6 KB (885 words) - 10:12, 23 March 2007
  • '''Policies''' are the broad rules for ensuring the protection of information assets, and for implementing a security strategy or program. Generally brie ...s to a companies Board of Directors. Standards are approved by a companies technology review board.<br> ...
    4 KB (581 words) - 17:06, 30 December 2013
  • ==Sample End User Computing and Technology Policy== ...tablishing specific standards on appropriate business use of the Company's information and telecommunications systems and equipment. ...
    4 KB (507 words) - 14:58, 21 January 2014
  • ...and tribal governments, and other persons resulting from the collection of information by or for the Federal Government;<br> ...sure the greatest possible public benefit from and maximize the utility of information created, collected, maintained, used, shared and disseminated by or for the ...
    3 KB (414 words) - 10:37, 1 June 2010
  • ...that are needed to create, implement, and maintain a risk management-based Information Security Program that complies with SOX Section 404.<br> ...cies, and standards) that are needed to create, implement, and maintain an Information Security Program that complies with SOX Section 404.<br> ...
    1 KB (204 words) - 13:03, 14 July 2006
  • ...799]], "Information Technology - Code of practice for information security management." in 2000. [[ISO/IEC 17799]] was then revised in June 2005 and finally inc ...security management system]] (ISMS), referring to the information security management structure and controls identified in BS 7799-2, which later became [[ISO/IE ...
    2 KB (249 words) - 10:56, 27 October 2012
  • ...ves, or from programs, projects or service improvement initiatives. Change Management can ensure standardized methods, processes and procedures are used for all ==Change management in development projects== ...
    4 KB (523 words) - 10:24, 23 April 2010
  • '''DS 5.7 Protection of Security Technology '''<br> Ensure that important security-related technology is made resistant to tampering and security documentation is not disclosed ...
    3 KB (377 words) - 18:52, 4 May 2006
  • ...chnology - Security techniques - Code of practice for information security management''. The current standard is a revision of the version published in [[2000]], ...ng or maintaining [[ISMS|Information Security Management Systems]] (ISMS). Information security is defined within the standard in the context of the [[CIA triad|C ...
    6 KB (847 words) - 16:57, 26 March 2007
  • ...mer process, known as '''DITSCAP''' ('''Department of Defense Information Technology Security Certification and Accreditation Process'''), in 2006. ...at will maintain the [[Information Assurance]] (IA) posture of the Defense Information Infrastructure (DII) throughout the [[Systems Development Life Cycle|system ...
    2 KB (229 words) - 10:14, 15 April 2012
  • ...Framework (MOF) 4.0''' is a series of guides aimed at helping information technology (IT) professionals establish and implement reliable, cost-effective service ...| governance]], [[Risk_management | risk]], and [[compliance]] activities; management reviews, and Microsoft Solutions Framework (MSF) best practices.<br> ...
    3 KB (461 words) - 14:19, 23 April 2010
  • ...to create, implement, and maintain a best practice, risk management-based information security program.<br> ...to create, implement, and maintain a best practice, risk management-based Information Security Program.<br> ...
    5 KB (705 words) - 11:39, 30 May 2015
  • '''(a)''' The Director shall oversee agency information security policies and practices, by—<br> :'''(1)''' promulgating information security standards under section 11331 of title 40;<br> ...
    3 KB (414 words) - 11:45, 4 June 2010
  • ...nts to address: a definition of services; performance measurement; problem management; customer duties; warranties; disaster recovery; termination of agreement.< *[[IT Service Management]] ...
    3 KB (527 words) - 16:06, 22 March 2007
  • ...riate training of system users or owners where the systems house sensitive information. It has been superseded by the [[FISMA | Federal Information Security Management Act of 2002]] ...
    1 KB (168 words) - 11:37, 23 May 2010
  • ==Information Security Policy== ...ective of this category is to provide management direction and support for information security in accordance with business requirements and all relevant laws, re ...
    8 KB (1,063 words) - 13:25, 23 May 2007
  • ...e majority of their data processing, core processing, or other information technology systems or services are still expected to implement an appropriate BCP addr ...cial institutions are moving toward shorter recovery periods and designing technology recovery solutions into business processes. These technological advancement ...
    5 KB (705 words) - 13:42, 30 May 2007
  • ==Information Technology Management Reform Act of 1996== ...t of 1996 - Title LI (sic): Responsibility for Acquisitions of Information Technology.'''<br> ...
    10 KB (1,502 words) - 19:27, 4 April 2010
  • ...ine the nature of the impact— positive, negative or both—and maintain this information.<br> ...list to a control list of exceptions that has been previously certified by management. Any accounts that remain should be investigated as they are most likely po ...
    3 KB (459 words) - 17:56, 21 June 2006
  • '''PO 5.5 Benefit Management'''<br> ...ibution, appropriate actions should be defined and taken. Where changes in Information Technologies contribution impact the program, or where changes to other rel ...
    3 KB (475 words) - 13:09, 23 June 2006
  • =='''Sample On Premise Wireless Access Technology Guideline'''== ...jectives for establishing specific standards on the assessment and ongoing management of wireless technologies utilized for the extension of network infrastructu ...
    8 KB (1,123 words) - 16:01, 2 August 2009
  • ...1)''' the term '''information security''' means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification ...st improper information modification or destruction, and includes ensuring information non-repudiation and authenticity; ...
    3 KB (368 words) - 00:50, 1 June 2010
  • ..., people skills and competencies, organization structure, and the enabling technology. ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    4 KB (538 words) - 13:16, 23 June 2006
  • ...software, facilities, technology, and user procedures) and ensure that the information security requirements are met by all components. The test data should be sa Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    5 KB (730 words) - 19:05, 17 April 2007
  • Ensure that IT management, working with the business, defines a balanced set of performance objective * Future-oriented activities, for example, emerging technology, reusable infrastructure, business and IT personnel skill sets.<br> ...
    3 KB (362 words) - 12:33, 4 May 2006
  • '''DS 11.3 Media Library Management System '''<br> ...r [[AES | Advanced Encryption Standard]] (AES) 256-bit with associated key management processes and procedures.''' ...
    3 KB (401 words) - 11:50, 28 March 2008
  • ...t considers changes in the competitive environment, economies of scale for information systems staffing and investments, and improved interoperability of platform Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (351 words) - 17:03, 21 June 2006
  • [[Category:Information technology management|Governance]] [[Category:Information technology governance| ]] ...
    2 KB (235 words) - 09:48, 23 October 2012
  • '''(a)''' In General.— The Director shall oversee agency information security policies and practices, including—<br> ...g the implementation of policies, principles, standards, and guidelines on information security, including through ensuring timely agency adoption of and complian ...
    4 KB (671 words) - 10:44, 1 June 2010
  • ...shed procedures across the organization to protect information systems and technology from computer viruses. ...
    2 KB (279 words) - 19:02, 25 June 2006
  • ...ation of the costs of delivering IT capabilities and services. Ensure that technology investments are standardized to the greatest extent possible to avoid the i Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    3 KB (393 words) - 14:35, 21 June 2006
  • ...anagement procedure. Include periodic review against business needs, patch management and upgrade strategies, risks, vulnerabilities assessment and security requ ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    6 KB (819 words) - 13:54, 23 June 2006
  • ...ormation requirements, IT configuration, information risk action plans and information security culture into an overall IT security plan. The plan is implemented ...y policy exists and has been approved by an appropriate level of executive management. ...
    10 KB (1,333 words) - 17:44, 25 June 2006
  • ==FFIEC Information Technology Examination Handbook Executive Summary== ...ve effort of the FFIEC’s five member agencies, has replaced the 1996 FFIEC Information Systems Examination Handbook (1996 Handbook). ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • ...1)''' The term '''information security''' means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification ...st improper information modification or destruction, and includes ensuring information non-repudiation and authenticity; ...
    2 KB (327 words) - 00:58, 1 June 2010
  • ...financial resources expended by persons to generate, maintain, or provide information to or for a Federal agency, including the resources expended for—<br> :'''(B)''' acquiring, installing, and utilizing technology and systems; ...
    5 KB (795 words) - 00:35, 1 June 2010
  • ...bility to identify, acquire, install, and maintain appropriate information technology systems.” The process includes the internal development of software applic ...o deliver products or services, maintain a competitive position, or manage information.<br> ...
    12 KB (1,538 words) - 22:41, 25 April 2007
  • =='''Vulnerability Management Standard'''== ...jectives for establishing specific standards on the assessment and ongoing management of vulnerabilities.<br> ...
    9 KB (1,122 words) - 14:12, 1 May 2010
  • '''Federal Information Security Management Act (FISMA)''' ...the implementation of and compliance with the Federal Information Security Management Act including: ...
    9 KB (1,252 words) - 19:19, 19 April 2010
  • ...hanges to business processes, technology and skills are assessed. Business management, supported by the IT function, should assess the feasibility and alternativ Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (357 words) - 14:15, 3 May 2006
  • ...igence Directives.''' Protecting Special Access Program Information Within Information Systems policy excerpt: [[Media:JAFAN_6_3.pdf]]<br> :'''Avoid Session Management Pitfalls:''' [[Media:session-management-security.pdf]]<br> ...
    6 KB (839 words) - 16:22, 23 April 2007
  • == Requirement 12: Maintain a policy that addresses information security. == ::[[Image:Key-control.jpg]][[PCI-12.3.1:|PCI-12.3.1 Explicit management approval.]]<br> ...
    7 KB (988 words) - 19:11, 7 July 2006
  • ...virus control) across the organization to protect information systems and technology from malware (viruses, worms, spy-ware, spam, internally developed fraudule ...shed procedures across the organization to protect information systems and technology from computer viruses. ...
    8 KB (1,177 words) - 19:00, 25 June 2006
  • ==Security requirements of information systems== ...egory is to ensure that security is an integral part of the organization's information systems, and of the business processes associated with those systems.<br> ...
    9 KB (1,170 words) - 14:05, 22 May 2007
  • ...mation technology (IT) systems and their performance management and [[risk management]]. The rising interest in IT governance is partly due to compliance initiat ...bility framework to encourage desirable behavior in the use of information technology."''<br> ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ...ding networks, systems, and applications that store, process, and transmit information assets.<br> ...tives established in the [[Sample Asset Management Policy:|'''Sample Asset Management Standard''']], and provides specific instructions and requirements for esta ...
    9 KB (1,213 words) - 13:20, 9 March 2009
  • ...rization controls over the initiation of transactions, resulting financial information may not be reliable. :::a. [[SOX.2.7.10:|'''SOX.2.7.10''']] Management protects sensitive information— logically and physically, in storage and during transmission—against unaut ...
    5 KB (721 words) - 11:49, 28 March 2008
  • ==Incident Management== ...| Service Level Management]] process area. The first goal of the incident management process is to restore a normal service operation as quickly as possible and ...
    9 KB (1,371 words) - 16:40, 23 May 2007
  • ...odies, such as an IT strategy committee, to provide strategic direction to management relative to IT, ensuring that the strategy and objectives are cascaded down Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    3 KB (410 words) - 13:30, 4 May 2006
  • ...ings are well known in hacker communities and easily determined via public information.<br> ...ngs, and disabling of SSID broadcasts. Enable Wi-Fi Protected Access (WPA) technology for encryption and authentication when WPA-capable.]]<br> ...
    2 KB (283 words) - 17:00, 26 June 2006
  • ...bjective of this category is to ensure the correct and secure operation of information processing facilities.<br> ==Communications and Operations Management== ...
    19 KB (2,609 words) - 13:51, 23 May 2007
  • ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    6 KB (878 words) - 13:34, 23 June 2006
  • ...chnology - Security techniques - Code of practice for information security management''. ...ng or maintaining [[ISMS|Information Security Management Systems]] (ISMS). Information security is defined within the standard in the context of the [[CIA triad|C ...
    8 KB (1,111 words) - 10:30, 15 April 2012
  • ...s granted to some users increases the risk of accidental damage or loss of information and systems.<br> Financial institutions should have a process to verify job application information on all new employees. The sensitivity of a particular job or access level m ...
    10 KB (1,327 words) - 12:54, 10 April 2007
  • [[PO1.1:| 1.1 IT Value Management]]<br> [[PO1.6:| 1.6 IT Portfolio Management]]<br> ...
    4 KB (517 words) - 19:07, 14 June 2007
  • ...sider include impact analysis, cost/benefit justification and requirements management.<br> ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    3 KB (425 words) - 13:19, 23 June 2006
  • ...systems and processes used for those purposes. While focused dominantly on information in digital form, the full range of IA encompasses not only digital but also Information assurance as a field has grown from the practice of [[information security]] which in turn grew out of practices and procedures of [[computer ...
    7 KB (983 words) - 10:41, 15 April 2012
  • '''EVALUATION OF CONTROLS IN INFORMATION SYSTEMS (IS) QUESTIONNAIRE'''<br> ...estion. This can generally be achieved if the company involves an internal information systems auditor in the question answering process. Specific “Guidance Point ...
    8 KB (1,155 words) - 20:14, 25 June 2006
  • ...res that all user organizations and their auditors have access to the same information and in many cases this will satisfy the user auditor's requirements.<br> ...ol oriented professionals who have experience in accounting, auditing, and information security. A SSAE 16 engagement allows a service organization to have its co ...
    10 KB (1,457 words) - 21:20, 21 August 2012
  • ...r abnormal activities that may need to be addressed. Access to the logging information is in line with business requirements in terms of access rights and retenti ...ngs, and disabling of SSID broadcasts. Enable Wi-Fi Protected Access (WPA) technology for [[Encryption | encryption]] and authentication when WPA-capable.<br> ...
    7 KB (975 words) - 16:57, 9 April 2007
  • ::Information Security Staff ::Interested Executive and Business Unit Management. ...
    2 KB (315 words) - 18:46, 25 September 2006
  • ...tablishing specific standards on appropriate business use of the Company's information and telecommunications systems and equipment. Company information and telecommunications systems and equipment, including Internet, electroni ...
    3 KB (464 words) - 17:48, 14 January 2014
  • ...protection and management objectives, and define acceptable use of Company information assets.<br> ...iality, integrity, and availability of Company information assets. Company information assets are defined in the [[Sample Asset Identification and Classification ...
    10 KB (1,314 words) - 18:06, 15 March 2009
  • ...ly dependent on IT and mediate between imperatives of the business and the technology, so agreed priorities can be established.<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    9 KB (1,301 words) - 16:55, 25 April 2007
  • ...d sites supporting the Company, or who have been granted access to Company information or systems, are covered by this policy and must comply with associated stan ...through systems owned or administered by or on the behalf of the Company. Information Assets include all personal, private, or financial data about employees, cl ...
    9 KB (1,430 words) - 14:56, 28 August 2009
  • ::'''(A)''' providing information security protections commensurate with the risk and magnitude of the harm r :::'''(i)''' information collected or maintained by or on behalf of the agency; and<br> ...
    10 KB (1,576 words) - 12:50, 4 June 2010
  • ::'''(A)''' providing information security protections commensurate with the risk and magnitude of the harm r :::'''(i)''' information collected or maintained by or on behalf of the agency; and<br> ...
    11 KB (1,610 words) - 19:37, 3 June 2010
  • == Requirement 4: Encrypt transmission of cardholder data and sensitive information across public networks. == ...lder data, encrypt the transmissions by using Wi-Fi Protected Access (WPA) technology if WPA capable, or VPN or SSL at 128-bit. Never rely exclusively on WEP to ...
    2 KB (346 words) - 12:22, 31 January 2014
  • Links to helpful or interesting information security documents.<br> ...ed of lawyers, government policy and management professionals, information technology and security professionals, notaries from various legal systems, trade faci ...
    10 KB (1,527 words) - 12:47, 25 April 2007
  • ...pes of services offered and the complexity of the processes and supporting technology.<br> ...l of security controls based on their assessment of the sensitivity of the information to the customer and to the institution and on the institution’s established ...
    11 KB (1,523 words) - 10:04, 28 April 2007
  • ...ding networks, systems, and applications that store, process, and transmit information assets.<br> ...tives established in the [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']], and provides specific instructions and requirements for the de ...
    12 KB (1,656 words) - 14:15, 1 May 2010
  • ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results a ...his systems development life cycle (SDLC) describes the stages involved in information system development projects, from an initial feasibility study through main ...
    6 KB (863 words) - 13:12, 23 June 2006
  • The board of directors and senior management are responsible for ensuring that the institution’s system of internal cont ...hould assign responsibility for the internal audit function to a member of management (hereafter referred to as the “internal audit manager”) who has sufficient ...
    28 KB (4,089 words) - 14:37, 16 April 2007
  • Set up formal change management procedures to handle in a standardized manner all requests (including maint ...ay provide invalid information, which could result in unreliable financial information and reports.<br> ...
    10 KB (1,393 words) - 14:28, 23 June 2006
  • ...ed into development and production processes and procedures to ensure that information assets are consistently available to conduct business and support business ...tem and network failures should be reported immediately to the Information Technology Director or designated IT operations manager. ...
    5 KB (646 words) - 21:03, 15 January 2014
  • ==Security Management== ...urity Management is based on the code of practice for information security management also known as ISO/IEC 17799. ...
    32 KB (4,804 words) - 14:10, 27 February 2009
  • #[[Getting it Right in Records Management | Getting it Right in Records Management]] ...rds management survey - call for sustainable ... | 2009 electronic records management survey - call for sustainable ...]] ...
    16 KB (2,124 words) - 11:06, 16 March 2010
  • ...most comprehensive, most beneficial, most accessible, and freely available information security guidance framework on the planet.<br> ...zation no matter what the size, shape, or form they come in. By protecting information, you protect identities, profits, reputations, and the list goes on and on. ...
    9 KB (1,241 words) - 20:49, 13 September 2016
  • ...ities, such as control and [[risk assessment]]s, on a more frequent basis. Technology plays a key role in continuous audit activities by helping to automate the ...mation can be evaluated at any given point of time, it also means that the information is able to be verified constantly for errors, fraud, and inefficiencies. It ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • '''Risk assessment''' is a step in the [[risk management]] process. Risk assessment is [[measurement|measuring]] two quantities of Risk assessment may be the most important step in the risk management process, and may also be the most difficult and prone to error. Once risks ...
    10 KB (1,633 words) - 16:03, 22 December 2007
  • ...ding networks, systems, and applications that store, process, and transmit information assets.<br> ...tives established in the [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']], and provides specific instructions and requirements for follow ...
    12 KB (1,684 words) - 14:14, 1 May 2010
  • ==Information Security Audit== ...dit. However, information security encompasses much more than IT. Auditing information security covers topics from auditing the physical security of data centers ...
    21 KB (3,112 words) - 16:52, 15 June 2007
  • ...structure (major machinery or computing/network resource). As such, [[risk management]] must be incorporated as part of BCP. ...for implementing, operating and improving a documented business continuity management system (BCMS). ...
    15 KB (2,046 words) - 11:39, 27 October 2012
  • =='''Sample Life Cycle Management Standard'''== ...ding networks, systems, and applications that store, process, and transmit information assets.<br> ...
    16 KB (2,312 words) - 14:14, 1 May 2010
  • ...Tier II questions correspond to the Uniform Rating System for Information Technology (URSIT) rating areas and can be used to determine where the examiner may re ::* Audit information and summary packages submitted to the board or its audit committee ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • ...covered that with an organized, systematic approach, you can approach risk management effectively. Risk simply put is the negative impact to business assets by t ...lping you understanding the core elements of a successful IT security risk management program for a commercial enterprise, the processes of calculating the cost ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ...technology (IT), services, business processes generally, and human capital management. The CMM has been used extensively worldwide in government, commerce, indus ...capability maturity. Humphrey based this framework on the earlier Quality Management Maturity Grid developed by Philip B. Crosby in his book "Quality Is Free". ...
    12 KB (1,863 words) - 11:32, 9 June 2010
  • ...Identifiable Information (PII)''', as used in [[information security]], is information that can be used to uniquely identify, contact, or locate a single person o ...oncept of PII is ancient, it has become much more important as information technology and the Internet have made it easier to collect PII, leading to a profitabl ...
    12 KB (1,899 words) - 12:24, 12 November 2011
  • ...[information technology]] (IT) services. ITIL outlines an extensive set of management [[procedure]]s that are intended to support businesses in achieving both qu ...s (hence the term ''Library''), each of which covers a core area within IT Management. The names ''ITIL'' and ''IT Infrastructure Library'' are Registered Trade ...
    37 KB (5,348 words) - 10:12, 8 September 2011
  • A well-defined, supported, enforced management policy maximizes the rewards and minimizes the risks of the open-source sof ...hem. Query each of your third-party commercial software suppliers for this information as well; then, examine each product to ensure you are using it in complianc ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • ...l institutions – such as credit reporting agencies – that receive customer information from other financial institutions. ...npublic information or not, there must be a policy in place to protect the information from foreseeable threats in security and data integrity ...
    15 KB (2,184 words) - 17:02, 15 June 2007
  • ==Risk Management== ...ng some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes (e.g. natural disas ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • ’Personal Data’ means any information concerning an identified or identifiable individual. Unless otherwise noted ...such as racial or ethnic origin, present or future health status, genetic information, religious, philosophical or moral beliefs, union affiliation, political vi ...
    18 KB (2,869 words) - 17:46, 29 August 2014
  • ...[National Institute of Standards and Technology]] (NIST) as U.S. [[Federal Information Processing Standard|FIPS]] PUB 197 (FIPS 197) on November 26 2001 after a 5 ...ne 2003, the US Government announced that AES may be used for [[classified information]]: ...
    18 KB (2,766 words) - 11:41, 28 March 2008
  • ...cording to whether the risk management method is in the context of project management, security, risk analysis, industrial processes, financial portfolios, actua Certain aspects of many of the risk management standards have come under criticism for having no measurable improvement on ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • ...h of both mathematics and computer science, and is affiliated closely with information theory, [[computer security]], and engineering. Cryptography is used in man ...of the number of network members, which very quickly requires complex key management schemes to keep them all straight and secret. The difficulty of establishin ...
    26 KB (3,873 words) - 11:44, 28 March 2008
  • This Act may be cited as the `Electronic Freedom of Information Act Amendments of 1996'. ...t, is to require agencies of the Federal Government to make certain agency information available for public inspection and copying and to establish and enable enf ...
    18 KB (2,889 words) - 10:47, 22 May 2010
  • ...isions such as whether to deploy a standby database, a network replication technology, or a tape-based solution.</font><br> On the other hand, senior management may demand that disaster recovery be put in place before an application is ...
    20 KB (3,195 words) - 02:47, 23 February 2007
  • ...corporation is governed. The principal stakeholders are the shareholders, management, and the board of directors. Other stakeholders include employees, customer ...needs of shareholders and other stakeholders, by directing and controlling management activities with good business savvy, objectivity, accountability and integr ...
    29 KB (4,284 words) - 17:19, 20 April 2010
  • ...' describes the legal issues related to use of inter-networked information technology. It is less a distinct field of law in the way that property or contracts a ..., namely, does the government have a legitimate role in limiting access to information? And if so, what forms of regulation are acceptable? The recent blocking o ...
    20 KB (2,921 words) - 16:47, 29 August 2014
  • ...rvices intended to circumvent measures (commonly known as [[digital rights management]] or DRM) that control access to copyrighted works. It also criminalizes th ...ol technology. Exemptions are granted when it is shown that access-control technology has had a substantial adverse effect on the ability of people to make non-i ...
    26 KB (3,969 words) - 11:00, 30 October 2011
  • ...istic creations, such as books, music, paintings and sculptures, films and technology-based works such as computer programs and electronic databases. In most Eur ...enable it to perform a specific task, such as the storage and retrieval of information. The program is produced by one or more human authors, but in its final “mo ...
    46 KB (7,265 words) - 12:09, 2 May 2010
  • ...e disabled, changed, or otherwise properly configured to prevent access to information classified as Proprietary or Confidential.<br> Security administrators SHOULD consider issues related to privilege management for all types of users. For example, in a database with many usernames, it ...
    22 KB (3,612 words) - 16:20, 15 November 2007
  • ...system by creating standards for the use and dissemination of health care information.<br> ...health care clearinghouses, such as billing services and community health information systems, and health care providers that transmit health care data in a way ...
    32 KB (4,732 words) - 19:36, 29 November 2013
  • ...ically stored communications. The Act does not prohibit disclosure of user information to non-government entities. See [[Privacy: Stored Communications Act | main ...riot Act, see below, amended these provisions to permit disclosure of such information to the government if the service provider has a good faith belief that ther ...
    22 KB (3,315 words) - 00:16, 16 September 2011
  • ...corporation is governed. The principal stakeholders are the shareholders, management, and the board of directors. Other stakeholders include employees, customer ...needs of shareholders and other stakeholders, by directing and controlling management activities with good business savvy, objectivity, accountability and integr ...
    45 KB (6,604 words) - 15:20, 15 April 2010
  • ...lyzed in Smith and explaining how modern pen/trap devices collect far more information). ...ically stored communications. The Act does not prohibit disclosure of user information to non-government entities. See main article on Stored Communications Act. ...
    23 KB (3,434 words) - 17:34, 13 April 2011
  • ...islation set new or enhanced standards for all U.S. public company boards, management and public accounting firms. It does not apply to privately held companies. ...sses. In many cases, Audit Committee members were not truly independent of management. ...
    38 KB (5,614 words) - 14:31, 15 April 2010
  • ==Information Technology Auditor's Glossary== A service that gathers information from many websites, presents that information to the customer in a consolidated format, and, in some cases, may allow the ...
    74 KB (11,078 words) - 13:08, 9 April 2007
  • Authorized individuals may be employees, technology service provider (TSP) employees, vendors, contractors, customers, or visit ...mechanism includes numerous controls to safeguard and limits access to key information system assets at all layers in the network stack. This section addresses l ...
    78 KB (11,440 words) - 02:00, 10 April 2007
  • ...as a network design principle. The idea is that a maximally useful public information network aspires to treat all content, sites, and platforms equally." ...ts of net neutrality include consumer advocates, online companies and some technology companies. Many major Internet application companies are advocates of neutr ...
    52 KB (7,736 words) - 20:12, 1 October 2011
  • ...milton, 413 F.3d 1138, 1142-43 (10th Cir. 2005) (computer-generated header information was not hearsay as "there was neither a 'statement' nor a 'declarant' invol ...he first two categories, such as: email containing both content and header information; a file containing both written text and file creation, last written, and l ...
    43 KB (6,432 words) - 13:22, 5 August 2011
  • ...tion 11 of the Atomic Energy Act of 1954, with reason to believe that such information so obtained could be used to the injury of the United States, or to the adv (A) information contained in a financial record of a financial institution, or of a card is ...
    85 KB (12,600 words) - 16:49, 1 March 2009
  • ...er without authorization or exceeds authorized access, and thereby obtains information from any protected computer if the conduct involved an interstate or foreig ...nt computer, accessing to defraud and obtain value, damaging a computer or information, trafficking in passwords, and threatening to damage a computer. Attempts t ...
    53 KB (7,910 words) - 21:25, 13 April 2011
  • ...d non-U.S. citizens, and changed FISA to make gaining foreign intelligence information the significant purpose of FISA-based surveillance, where previously it had and gave authorities the ability to share information gathered before a federal grand jury with other agencies.<ref name="Section ...
    142 KB (21,198 words) - 10:23, 23 August 2011
  • ...h Amendment generally prohibits law enforcement from accessing and viewing information stored in a computer if it would be prohibited from opening a closed contai ...all within an exception to the warrant requirement, before it accesses the information stored inside. ...
    154 KB (23,956 words) - 13:16, 5 August 2011
  • ...nd flash drives, and the times the computer was in use. Collectively, this information can reveal to an investigator not just what a computer happens to contain a ...yes, 798 F.2d 380, 382 (10th Cir. 1986) (noting that "in the age of modern technology . . . , the warrant could not be expected to describe with exactitude the p ...
    138 KB (21,660 words) - 13:18, 5 August 2011